ATM and Biometric Authentication: A Comprehensive Analysis ITC 595

Verified

Added on  2025/04/29

|11
|1747
|266
AI Summary
Desklib provides past papers and solved assignments for students. This report explores ATM security and biometric authentication.
Document Page
ITC 595
Assessment Item 2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction................................................................................................................................3
Answer 1....................................................................................................................................4
Answer 2....................................................................................................................................5
Answer 3....................................................................................................................................6
Answer 4....................................................................................................................................7
Answer 5....................................................................................................................................8
Conclusion................................................................................................................................10
References................................................................................................................................11
Document Page
Introduction
This file is based on ATM and biometric authentication. This file consists of 5 questions
which are explained in brief so that the user can get an idea of biometric. In the first question,
ATM’s working using pin will be explained and its advantages will be mentioned to support
the positive points of ATM. In the second question permutation and combination are to be
performed to obtain the desired result. In the third question, biometrics disadvantage will be
explained with the solution to overcome the problem. In the fourth part, false negative and
false positive rates related to biometric will be explained to the reader. In the last part how
ciphertext can be performed by Transposition techniques will be mentioned.
Document Page
Answer 1
ATM is a device which provides services such as deposits, transfer funds, cash withdrawals,
or displaying any information related to counting details. The ATM card consists of a
magnetic strip on the back side of the card which contains users information. There is a
unique code present on each ATM card which uniquely identifies the user. There are 2 types
of ATM. One ATM allows the user to deposit cash in the machine and another one allows the
user to withdraw cash from the machine(Konheim, A. G., 2016).
The ATM pin isn’t unique but ATM card is unique to which the pin is registered. The pin is
used to access the account when the ATM card is inserted. The pin provides the first level of
security as the card wouldn’t work until the correct pin is entered.
Confidentiality: This is the process of converting the information into encrypting language
so that the data when traveling in confidential and no manipulation is done to the account.
For example, The user has to enter the correct pin and card so that he/ she can access the
services provided by the ATM.
Integrity: In this other, then the user such as the third person is also involved who has the
power to access the transaction amount.
For example: If a company wants to pay a certain amount to a client and the third person
notices some error in the amount then the third person can change the amount and correct
amount would be sent to the client.
Availabilities: They power is given to only authorized user so that misuse of the account
doesn’t occur. No other than the authorized user has the power to access the account and if
somehow is accessed then it’s a crime.
For example, The user is provided with unique card detail and the user decides the pin. When
both the details are verified then the account can be accessed by the user.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Answer 2
Thief has damaged 5 keys from the keypad of ATM machine. Thief has also installed card
reader so that the details of the card can be copied to the card reader and can be accessed by
the thief. The next task is to crack the pin code entered by the user to successfully access the
account. This reduces thief’s work to 50%as the combination would be formed from the
remaining keys.
The ATM has a number from 0 to 9 and from a combination of numbers, the pin is generated
out of which the thief has damaged 5 keys so the user had entered the pin from the remaining
keys. The combination could be made from 0000 till 9999 as the keypad contains 0, 1, 2, 3, 4,
5, 6, 7, 8, 9, & 0 and the pin consist of four digits.
In this P&C would be used and random pin would be entered until the password is accepted
by the machine.
In the given question it is being said that 5 keys were damaged, so only 5 keys were
remaining and the customer has a pin which is being constructed by 5 keys. So total no. of
combinations which are being acquired by a thief for 4 digit pin with taking into
consideration that pin can be a combination of a repeated number of the sequence. A total
combination which would be possible for getting the right key would be 5X5X5X5 = 625-1=
624, as 1 is ATM correct pin. This much combination should be used by a thief to access the
ATM card of the customer.
Document Page
Answer 3
Inaccurate Matching:
the passwords are stored in hash form so when the password is entered it is always the same
but in case of biometrics the fingerprint isn’t 100% matched as the pressure, damaged skin or
other factors makes the fingerprint different so sometimes they aren’t reorganized. So to
overcome this problem the accuracy is kept low so that biometric can match with the
respective user. The accuracy is around 90% and 10% is left as it can vary every time the user
uses a biometric system.
Data Breaches:
The password is unique for every user as the user has different fingerprints. Due to this, the
password can’t change like you used to do with characters. The fingerprints are the same
from the starting until the end of your life The fingerprint can be left anywhere and the
unauthorized person can access the information by creating the copy of the fingerprint.
A large volume of information
A normal password and user name consist of 10 to 60 characters whereas biometric consist of
1024*1024 size image which is quite large to transmit over the internet. When dealing with
less number of users its fine but when the users are increased then the backend isn’t that
powerful to transmit the data (Araki, P., & Ramaswamy, V., 2016).
Document Page
Answer 4
is False positive the condition where the user gets access without the authentication because
of the incorrect match.
False negative is the condition where the user is valid but the system couldn’t identify and
rejects the request.
There is inversely proportional relationship positive as when false negative is reduced than
false rejects are increased.
Case 1: Suppose a person has saved the face recognition and if the phone is unlocked by
some other user than this case comes under false negative as this unlocks the phone by using
the face of another person.
Case 2: Suppose a person has locked the phone and can be accessed by only his/ her
fingerprint if another person attempts to unlock the phone and it will not unlock as the
fingerprints are unique for everybody. This case comes under false positive(Lin et al., 2015).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Answer 5
Transposition is a technique for encrypting any text. This improves the security of the text
message and this process is called cryptography. In this, the text message is encrypted from
the sender side while sending the message and the text message will be decrypted when
received on the receiver side. There are several techniques to perform this process and
transposition is one of them (Nurdiyanto et al., 2017)
Cryptography is the technique through which the text message is secured when the message
is sent over the network. This prevents hackers to take valuable information form the
message.
Encryption:
Encryption is a process in which the message is encoded in a format which can be accessed
by authorized personnel only. A ciphertext is generated which can be decoded with a decoder
only. There are algorithms mentioned which use pseudo-random encryption. Before the data
was encrypted by overwriting the words or make a pattern. This process is known as Crypto
shredding. The letters are transferred in a particular fashion such as rail, these are read and
written in the column form.
Decryption:
This is exactly opposite to encryption as in this the data which is received in the form of
encryption is decoded. The person who is authorized to that message can only decrypt the
message. The text received is in the form of ciphertext. The text messages when transferred
and received are equal in length, this denotes that the message is received completely. This
makes it difficult to access the data if the user doesn’t have permission (Definitions & Hope,
2019).
Numerical
Step I: A=0, B=1 and so on the convention is being assumed to solve the question ahead and
text will be converted into ciphertext is being shown below. The text will be mod with 26 to
create a cipher which is listed below:
4, 13, 17, 8, 4, 14, 4, 23, 23, 10, 9, 2, 12, 22, 4, 20, 10, 14, 25,14,18, 3,13,17, 2,26,13,
25,13,13
Step II: Text will be decrypted using vignere cipher and the result is being subtracted by 567
and then again it is being mod with 26.
After mod : 25,7, 10, 3,24,7,25, 17,16,5, 3,21,7,16, 23,15,4,7,20,8, 11,24,7,10, 23,16, 6, 20,
7, 6.
Step III: Method which is being used for analyzing the result is Brute Force and it will
calculate result at each shift.
Processing till 25 shifts.
1st Shift…..
2nd Shift…..
Document Page
3rd Shift= WE HAVE WON CASE NUMBER FIVE HUNDRED
Result will be appeared after 3Rd shift.
Document Page
Conclusion
This report contains the assignment which has 5 questions. The brief introduction of ATM is
mentioned along with its types such as availability, integrity, and confidentiality The second
question contains the math part in which P&C is used to solve the question. The third part is
on biometric authentication in which factors affecting biometric and how the problems can be
solved. In the fourth question, false negative and false positive related to biometric
authentication is mentioned along with 2 cases. In the fifth part encryption and decryption is
done while using transposition. How the message is encrypted and decrypted is mentioned.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Baraki, P., & Ramaswamy, V. (2016). Bio-Metric Authentication of a User using Hand
Gesture Recognition. International Journal of Applied Engineering Research, 11(6), 4118-
4123.
Konheim, A. G. (2016). Automated teller machines: their history and authentication
protocols. Journal of Cryptographic Engineering, 6(1), 1-29.
Lin, J., Fernandez, H., Shashaty, M. G., Negoianu, D., Testani, J. M., Berns, J. S., ... &
Wilson, F. P. (2015). The false-positive rate of AKI using consensus creatinine-based
criteria. Clinical journal of the American Society of Nephrology, 10(10), 1723-1731.
Nurdiyanto, H., Rahim, R., & Wulan, N. (2017, December). Symmetric Stream Cipher using
Triple Transposition Key Method and Base64 Algorithm for Security Improvement.
In Journal of Physics: Conference Series (Vol. 930, No. 1, p. 012005). IOP Publishing
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]